The host is installed with Open Management Infrastructure before 1.8.1.0 and is prone to a remote code execution vulnerability. A remote unauthenticated attacker could access the OMI instance from the Internet and send specially crafted requests to trigger a use-after-free vulnerability. Customers running affected versions of SCOM (System Center Operations Manager) should update to OMI version 1.8 ...
The host is installed with Open Management Infrastructure before 1.8.1-0 and is prone to a privilege escalation vulnerability. Successful exploitation of this vulnerability will locally elevate the attacker's privileges to communicate as Root with OMI server. Successful exploitation of this vulnerability requires an attacker be an authenticated user on the resource to access the necessary socket f ...
The host is installed with Open Management Infrastructure before 1.8.1.0 and is prone to a privilege escalation vulnerability. Successful exploitation of this vulnerability will locally elevate the attacker's privileges to communicate as Root with OMI server. Successful exploitation of this vulnerability requires an attacker be an authenticated user on the resource to access the necessary socket f ...
The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Thread Pooling. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Client: mysqldump. Successful exploitation allows attackers to affect confidentiality, integrity and availability.
The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Group Replication Plugin. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: DDL. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.35 or 8.2.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Audit Plug-in. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.36 or 8.3.0 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Data Dictionary. Successful exploitation allows attackers to affect availability.